COURSE OBJECTIVE:
• Define key concepts and terminology associated with advanced IAM practices.
• Identify the four pillars of IAM and their significance in identity and access management.
• Explain the framework of policies, processes, and technologies in IAM.
• Describe the stages of IAM, from identity provisioning to de-provisioning.
• Understand the principles and benefits of Zero Trust Architecture in IAM.
• Implement advanced authentication mechanisms such as biometric and passwordless authentication.
• Configure Attribute-Based Access Control (ABAC) and Policy-Based Access Control (PBAC) policies.
• Set up Single Sign-On (SSO) and Identity Federation between multiple systems.
• Conduct role mining and access certification using Identity Governance and Administration (IGA) tools.
• Analyze the challenges and solutions for IAM in multi-cloud environments.
• Examine identity analytics and intelligence to detect anomalies and enhance security.
• Evaluate the effectiveness of Privileged Access Management (PAM) solutions in managing privileged accounts.
• Design a comprehensive IAM framework incorporating policies, processes, and technologies.
• Develop an advanced IAM solution, integrating IAM with DevOps pipelines and implementing secrets management.
• Create a simple decentralized identity solution using blockchain technology.
• Assess IAM implementations for compliance with regulatory requirements such as GDPR and HIPAA.
• Review and critique real-world case studies of complex IAM implementations to derive best practices.
• Evaluate the impact of emerging trends such as AI, machine learning, and Identity as a Service (IDaaS) on IAM strategies.
TARGET AUDIENCE:
– Experienced IT Security Professionals (Min. 1+ years exp.)
– IAM Administrators
– System and Network Administrators
– IT Managers and Directors
– DevOps Engineers
– Compliance and Risk Management Professionals
– Software Developers and Architects
– Consultants and Advisors
COURSE PREREQUISITES:
• Familiarity with basic IAM concepts and technologies.
• Practical experience with IT systems, networking, and basic security practices.
• A keen interest in learning about advanced IAM technologies and practices.
COURSE CONTENT:
Advanced IAM Concepts
• Understanding the Framework of Policies, Processes, and Technologies
• Hands-on Practice: Designing a basic IAM framework including policies and processes using a sample IAM tool
• The Four Pillars of IAM
• Hands-on Practice: Implementing the four pillars in a sample IAM environment
• Advanced Authentication Mechanisms
• Hands-on Practice: Configuring ABAC and PBAC policies using a sample IAM tool
• Identity Federation and SSO
• Hands-on Practice: Setting up SSO and Identity Federation between two systems
• Identity Governance and Administration (IGA)
• Hands-on Practice: Conducting a role mining exercise and setting up an access certification campaign
• Case Studies and Real-World Scenarios
• Interactive Discussion: Group discussion on case studiesPractical Applications and Emerging Trends
• IAM in Multi-Cloud Environments
• Hands-on Practice: Configuring IAM policies across multiple cloud platforms
• Identity Analytics and Intelligence
• Hands-on Practice: Setting up identity analytics and creating custom reports and alerts
• Blockchain and Decentralized Identity
• Hands-on Practice: Creating a simple decentralized identity solution using blockchain
• IAM Compliance and Regulatory Requirements
• Hands-on Practice: Conducting a compliance audit and generating required reports
• Stages of IAM
• Hands-on Practice: implementing lifecycle management stages in a sample IAM tool
• Emerging Trends in IAM
• Interactive Discussion: Group discussion on the impact of emerging trends
FOLLOW ON COURSES:
Not available. Please contact.